Authentication method for multi-owner RFID tags

A technology of RFID tags and authentication methods, applied in the field of authentication for multi-owner RFID tags, can solve problems such as reducing information interaction, and achieve the effects of reducing information interaction, simplifying protocols, and improving computing efficiency

Active Publication Date: 2020-11-13
XIDIAN UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above two documents are authentication methods for single-owner RFID tags, but during the life of the tag, the tag is usually attached to the object and will experience multiple owners, and the weight of these owners will also change. Therefore, the authentication of multi-owner RFID tags has important practical significance
[0004] Gan Yong and others proposed the authentication process of the original owner and the tag in the "Dynamic Transfer Protocol of Multi-Owner R

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method for multi-owner RFID tags
  • Authentication method for multi-owner RFID tags
  • Authentication method for multi-owner RFID tags

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Below with reference to accompanying drawing, the present invention is described in detail:

[0052] refer to figure 1 , the authentication method for multi-owner RFID tags provided by the present invention, the specific implementation steps are as follows:

[0053] Step 1, initialization phase.

[0054](1a) Set the identity of the tag to TID, and set the identity of each reader to RID i , set the tag key to KG, and set the shared secret key between each reader and tag Set the sum of key weights to w.

[0055] (1b) Store the key and tag set in (1a), and the relevant information that comes with the reader:

[0056] Concatenate the tag's identity TID and the tag key KG, encrypt it using a hash operation, and record it as the original second message M' 2 , stored in the backend database BD;

[0057] Each reader's identity RID i And the corresponding subkey is stored in the backend database BD;

[0058] Each reader identity RID i , the shared key between each read...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method for a multi-owner lightweight RFID tag, and mainly solves the problems of information interaction and resource consumption in the process of authenticating ownership of the tag by multiple owners in radio frequency recognition RFID authentication. The scheme comprises the following steps: 1) initializing protocol parameters; 2) the reader sends identity information to the label; 3) the electronic tag authenticates the reader, and judges whether the sub-key weight contained in the reader reaches a threshold value or not; 4) the rear-end databasereceives the judgment information of the tag and compares the judgment information with self-stored information to authenticate the electronic tag; 5) the label recovers the secret key, compares the secret key and authenticates the back-end database; according to the key sharing method adopted by the invention, the key can be recovered when the weight of the received sub-key reaches a threshold value, so that the protocol is simplified, the information interaction is reduced, the communication safety is ensured, and the key sharing method can be better suitable for a multi-owner RFID authentication system.

Description

technical field [0001] The invention belongs to the technical field of information processing, and further relates to an authentication method for multi-owner RFID tags in the technical field of information security. It can be used for multi-owner authentication of tags in radio frequency identification (RFID) systems. Background technique [0002] Radio frequency identification (RFID) technology is a wireless communication technology that can identify targets and read data without physical contact. Because radio frequency identification RFID technology has non-contact, no visibility, convenience, rapid identification, It has the advantages of being able to identify multiple tags at one time, so it has broad application prospects in many fields such as transportation, logistics, medical treatment, and production. The traditional radio frequency identification system mainly includes three parts: electronic tags, readers, and background servers. [0003] Tong Jiaqing and oth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K7/10H04L9/08
CPCG06K7/10297G06K7/10257H04L9/0891
Inventor 董庆宽范美月陈原王蕾杨灿
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products